Bringing a Business Perspective to Cybersecurity Operations II

  • TYPE: Combined Session DATE: Tuesday, October 08, 2019 TIME: 14:15-15:15 LOCATION: Holeman Lounge
Track

Sessions:

The Internet of Things (IoT) is growing faster than our ability to safeguard ourselves. As IoT becomes ubiquitous, it is important to consider the safety impacts of cyber-physical systems. In the interest of public safety, future cybersecurity systems will adapt to threats in real time based on the standards being developed today.

This talk will cover identify several key industry standards and how they will contribute to IoT safety. It will conclude with a vision of how future IoT systems will be safer by tieing these activities together.


The Internet of Things (IoT) is growing faster than our ability to safeguard ourselves. As IoT becomes ubiquitous, it is important to consider the safety impacts of cyber-physical systems. In the interest of public safety, future cybersecurity systems will adapt to threats in real time based on the standards being developed today. 

The downsides of ignoring safety will be discussed with some IoT examples from the transportation, healthcare, factory, and utility sectors. After setting the stage on the importance of cybersafety using Fear, Uncertainty, and Doubt (FUD), I'll argue against using FUD and present the proven risk management scientific principles that should be used instead for all security decision making. Instead decisions will be done algorithmically based on proven scientific methods using security policy, risk tolerance, and the potential safety/financial impacts of the threat. Factor Analysis of Information Risk (FAIR) is a practical framework for understanding, measuring and analyzing information risk, and ultimately, for enabling well-informed decision making. The talk will give a brief introduction to FAIR and the Open Group standards related to it, as well as how it applies to IoT.

Modern software systems involve increasingly complex and dynamic supply chains. Lack of systemic transparency into the composition and functionality of these systems contributes substantially to cybersecurity risk. This talk will cover the work underway in a NTIA Working Group on Software Transparency and the use cases for Software Bill of Materials (SBoM).

The third principle necessary for IoT safety is responding to a cyber-attack at machine speed. The talk will cover why that is important to IoT and what should be done to achieve response in cyber-relevant time. The economic benefits of automation and machine-speed response will be presented. The OASIS OpenC2 standards for command & control (C2) will be discussed and how those standards will facilitate automation in IoT, particularly in conjunction with several other OASIS standards on sharing threat intelligence (STIX/TAXII) and playbooks (CACAO). The talk will conclude with a vision of how future IoT systems will be safer by tying these activities together.

Key take-aways:

  • Attendees will learn about several standards that will help make IoT safer.Attendees will learn how to make more informed decisions based on risk tolerance.
  • Attendees will learn about the use cases for Software Bill of Materials (SBoM), and they will leave desiring their suppliers to provide SBoM and desiring to create SBoM's for any software they supply.

Attendees will learn about the use cases for OpenC2, STIX/TAXII, and CACAO in the context of IoT safety.

Speaker:

Duncan Sparrell is a seasoned (aka old) network security evangelist with 40+ years of expertise in conceiving, developing and delivering state-of-the art software platforms. Duncan graduated from Rensselaer with Bachelor and Master Degrees in Electrical Engineering back when computers were...


So you're receiving cyber threat intelligence (CTI) from outside sources. Great. Now what? How do you find the intelligence that's relevant to you and your organization? And how can you use that information to adopt a more proactive cyber defense posture?

This presentation will outline a strategy that information security analysts and engineers should consider to help them isolate relevant intelligence and make it more actionable by using their existing infrastructure of sensors and controls. With this strategy in play, teams and organizations will be able to think about cyber defense in proactive terms, and move away from only reacting after an attack has already hit their systems.

Questions answered by the speaker include:

  • How CTI is typically used today
  • What is the "Feedback" gap
  • How to close the gap
  • How this helps real-time (at machine speed) cyber defense

Speaker:



Log in to download presentations:  

Moderators:

Session Links


Washington, D.C. - USA

Conference

CyberNext Summit 2019

Language:
English
Registration fee:
€1000.00 $1250.00 S$1600.00 11000.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Oct 08 - 10, 2019 Washington, D.C. - USA